Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Venu Ayala
The Commerce Department's Economic Development Administration spent almost $3 million to remediate a cyber attack that really didn't happen. Commerce's inspector general found the attack infected only two outgoing email servers and not more than half of EDA's systems. Two cybersecurity experts say other agencies can learn from EDA's year-long unnecessary and expensive recovery.
Is your agency coping with identifying and protecting against the constant barrage of sophisticated cyber threats, while at the same time, trying to improve your FISMA scores? From reduced resources (budget, manpower and unified vision), to lack of an automated risk mitigation capabilities, these factors continue to impact civilian agency FISMA scores. WTOP brings together a panel of network security experts to explore the challenges civilian agencies face in dealing with critical cyber security concerns, and discuss how to coordinate defenses, leverage advanced tools and take advantage of CDM programs to help agencies tackle these issues. The White House has emphasized the need for continuous monitoring since 2010, and as part of the FY13 Homeland Security Appropriations Bill, DHS is to assist other federal agencies in enhancing their cybersecurity efforts. The CDM initiative gives participating agencies the means to implement continuous monitoring as a service (CMaaS), which is a bundled solution comprised of systems, sensors, risk- status displays and professional consulting services.